gfiocco / msg2emlLinks
Using Python 3 to covert MS Outlook .msg files to .eml format.
☆25Updated 2 years ago
Alternatives and similar repositories for msg2eml
Users that are interested in msg2eml are comparing it to the libraries listed below
Sorting:
- OneDrive log .ODL reader☆155Updated last year
- An implementation of a Windows Event Collector server running on GNU/Linux.☆88Updated 2 weeks ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆109Updated last year
- ☆67Updated 2 years ago
- A nice and simple Web Interface for LAPS (Local Administrator Password Solution)☆37Updated 2 weeks ago
- Analyze Windows Firewall outbound blocks and selectively allow traffic☆69Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Updated 4 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Updated 2 months ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆21Updated 4 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- Security even with a small budget - there is no excuse!☆20Updated 2 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22Updated 3 years ago
- Powershell Event Tracing Toolbox☆78Updated 3 years ago
- Local Administrator Password Solution (LAPS) - implementation for Linux, macOS and Windows with additional features☆79Updated 3 months ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 8 months ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆98Updated 8 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- AppLocker hardening policies☆26Updated 7 years ago
- Extracting IoC data from eMail☆140Updated this week
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- ☆101Updated 3 weeks ago
- ☆20Updated 3 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 months ago
- Dissect triage scripts for Citrix NetScaler devices☆68Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆85Updated 3 weeks ago
- Initial triage of Windows Event logs☆105Updated last year
- Scrapes the Windows Evaluation ISO addresses into a JSON data file☆28Updated 10 months ago